Trusted computing update


This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongoing, and provided insight into the driving forces and probable directions. This paper presents contemporary… (More)
DOI: 10.1016/0167-4048(95)97026-7


9 Figures and Tables

Slides referencing similar topics